<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE 3.3 system certificate update in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-3-3-system-certificate-update/m-p/5312944#M597439</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1069406"&gt;@MonkeyBear007&lt;/a&gt;&amp;nbsp;did you look at the ciscolive presentation and under the scenario of using wildcard or multiSAN certificate?&lt;/P&gt;</description>
    <pubDate>Wed, 23 Jul 2025 14:56:27 GMT</pubDate>
    <dc:creator>Rob Ingram</dc:creator>
    <dc:date>2025-07-23T14:56:27Z</dc:date>
    <item>
      <title>ISE 3.3 system certificate update</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-3-system-certificate-update/m-p/5312911#M597435</link>
      <description>&lt;P&gt;ISE 3.3 system certificate update&lt;/P&gt;&lt;P&gt;We use public cert and what is recommended way to renewal cert has they are part of the deployment pri and secondary&amp;nbsp;&lt;BR /&gt;they are not part of the PAN failover&lt;BR /&gt;&lt;BR /&gt;does it matter if i gave it two of the common name of both ISE servers and upload to each ISE?&lt;BR /&gt;best practice to make it for each ISE server?&lt;/P&gt;</description>
      <pubDate>Wed, 23 Jul 2025 13:57:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-3-system-certificate-update/m-p/5312911#M597435</guid>
      <dc:creator>MonkeyBear007</dc:creator>
      <dc:date>2025-07-23T13:57:08Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 3.3 system certificate update</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-3-system-certificate-update/m-p/5312914#M597436</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1069406"&gt;@MonkeyBear007&lt;/a&gt;&amp;nbsp;what certificate usage do you refer to admin, eap, portal etc?&lt;/P&gt;
&lt;P&gt;It's common to use the same certificate (wildcard or multi SAN) certificate on the ISE nodes for EAP and Portal usage.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/security-knowledge-base/how-to-implement-digital-certificates-in-ise/ta-p/3630897" target="_blank" rel="noopener"&gt;https://community.cisco.com/t5/security-knowledge-base/how-to-implement-digital-certificates-in-ise/ta-p/3630897&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Have a look at pages 31-37&lt;/SPAN&gt;&amp;nbsp;&lt;A href="https://www.ciscolive.com/c/dam/r/ciscolive/emea/docs/2024/pdf/BRKSEC-2234.pdf" target="_blank"&gt;https://www.ciscolive.com/c/dam/r/ciscolive/emea/docs/2024/pdf/BRKSEC-2234.pdf&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 23 Jul 2025 14:04:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-3-system-certificate-update/m-p/5312914#M597436</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2025-07-23T14:04:16Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 3.3 system certificate update</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-3-system-certificate-update/m-p/5312936#M597437</link>
      <description>&lt;P&gt;We use it for Admin, EAP authentication and portal&amp;nbsp;&amp;nbsp;&lt;BR /&gt;I was thinking for ISE1 ISE1.domain.com for common for ISE1&lt;BR /&gt;subject alternative name: ISE1, ISE2, IP address&amp;nbsp; and DSN server name and etc..&lt;BR /&gt;for ISE2 ISE2.domain.com for common for ISE2&lt;BR /&gt;subject name ISE1 and ISE2 and etc&lt;BR /&gt;subject alternative name: ISE1, ISE2, IP address&amp;nbsp; and DSN server name and etc..&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 23 Jul 2025 14:50:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-3-system-certificate-update/m-p/5312936#M597437</guid>
      <dc:creator>MonkeyBear007</dc:creator>
      <dc:date>2025-07-23T14:50:42Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 3.3 system certificate update</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-3-system-certificate-update/m-p/5312944#M597439</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1069406"&gt;@MonkeyBear007&lt;/a&gt;&amp;nbsp;did you look at the ciscolive presentation and under the scenario of using wildcard or multiSAN certificate?&lt;/P&gt;</description>
      <pubDate>Wed, 23 Jul 2025 14:56:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-3-system-certificate-update/m-p/5312944#M597439</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2025-07-23T14:56:27Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 3.3 system certificate update</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-3-system-certificate-update/m-p/5313070#M597446</link>
      <description>&lt;P&gt;I did training and you can have problem using wild cards.&lt;BR /&gt;I don't security will like idea of wild card&lt;BR /&gt;I though you can use intune to force to trust a cert&lt;/P&gt;</description>
      <pubDate>Wed, 23 Jul 2025 17:50:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-3-system-certificate-update/m-p/5313070#M597446</guid>
      <dc:creator>MonkeyBear007</dc:creator>
      <dc:date>2025-07-23T17:50:36Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 3.3 system certificate update</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-3-system-certificate-update/m-p/5313073#M597447</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1069406"&gt;@MonkeyBear007&lt;/a&gt;&amp;nbsp;read the official cisco live presentation above, it explains a scenario where you may wish to use the same certificate (a wildcard or multi-SAN) on all of the PSNs if a client is authenticated by different PSN. The issue I refer to is specific to apple devices though, if it is not applicable to your environment then deploy individual certificates to each node.&lt;/P&gt;</description>
      <pubDate>Wed, 23 Jul 2025 17:59:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-3-system-certificate-update/m-p/5313073#M597447</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2025-07-23T17:59:39Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 3.3 system certificate update</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-3-system-certificate-update/m-p/5314083#M597470</link>
      <description>&lt;P&gt;Hello,&lt;BR /&gt;For ISE 3.3 public certificate renewal on a primary and secondary deployment, it is best practice to generate a separate Certificate Signing Request (CSR) for each ISE node. While you can include both ISE server common names as Subject Alternative Names (SANs) in a single certificate and upload it to both, creating individual certificates for each ISE server, each with its own FQDN as the Common Name (CN) and also including the other node's FQDN as a SAN (if desired for specific services), is generally recommended. This approach simplifies management, clearly identifies each node, and aligns with the principle of least privilege for certificates. Remember that changing the Admin certificate will require a service restart, but ISE 3.3 offers a "Scheduled Restart" feature to minimize disruption. Always back up your existing certificates and keys before performing renewals.&lt;/P&gt;</description>
      <pubDate>Fri, 25 Jul 2025 11:51:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-3-system-certificate-update/m-p/5314083#M597470</guid>
      <dc:creator>alison23taylor</dc:creator>
      <dc:date>2025-07-25T11:51:56Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 3.3 system certificate update</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-3-system-certificate-update/m-p/5314185#M597471</link>
      <description>&lt;P&gt;thank you&lt;/P&gt;</description>
      <pubDate>Fri, 25 Jul 2025 15:48:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-3-system-certificate-update/m-p/5314185#M597471</guid>
      <dc:creator>MonkeyBear007</dc:creator>
      <dc:date>2025-07-25T15:48:48Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 3.3 system certificate update</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-3-system-certificate-update/m-p/5314870#M597502</link>
      <description>&lt;P&gt;is it recommended to do the primary first than do secondary for the ISE cert?&lt;/P&gt;</description>
      <pubDate>Mon, 28 Jul 2025 15:13:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-3-system-certificate-update/m-p/5314870#M597502</guid>
      <dc:creator>MonkeyBear007</dc:creator>
      <dc:date>2025-07-28T15:13:37Z</dc:date>
    </item>
  </channel>
</rss>

